Show filters
193 Total Results
Displaying 21-30 of 193
Sort by:
Attacker Value
Unknown

CVE-2019-14899

Disclosure Date: December 11, 2019 (last updated November 27, 2024)
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.
Attacker Value
Unknown

CVE-2012-1577

Disclosure Date: December 10, 2019 (last updated November 27, 2024)
lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.
Attacker Value
Unknown

CVE-2019-19521

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
Attacker Value
Unknown

CVE-2019-19520

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
Attacker Value
Unknown

CVE-2019-19519

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.
Attacker Value
Unknown

CVE-2019-8460

Disclosure Date: August 26, 2019 (last updated November 27, 2024)
OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service.
Attacker Value
Unknown

CVE-2019-19522

Disclosure Date: August 08, 2019 (last updated November 27, 2024)
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.
Attacker Value
Unknown

CVE-2018-14775

Disclosure Date: August 01, 2018 (last updated November 27, 2024)
tss_alloc in sys/arch/i386/i386/gdt.c in OpenBSD 6.2 and 6.3 has a Local Denial of Service (system crash) due to incorrect I/O port access control on the i386 architecture.
0
Attacker Value
Unknown

CVE-2017-1000372

Disclosure Date: June 19, 2017 (last updated November 26, 2024)
A flaw exists in OpenBSD's implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly earlier versions.
0
Attacker Value
Unknown

CVE-2017-1000373

Disclosure Date: June 19, 2017 (last updated November 26, 2024)
The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects OpenBSD 6.1 and possibly earlier versions.
0